Block chain processing method, device and equipment and storage medium
A processing method and blockchain technology, applied in the field of information security, can solve the problems of a single cryptographic algorithm, loss of user data/assets, and the inability of algorithms to be used at the same time, achieving the effect of easy upgrade, improved security and scalability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0040] figure 1 It is a flowchart of a block chain processing method provided by Embodiment 1 of the present invention. This embodiment is applicable to how to process block chains, especially for blocks that can support multiple mutually exclusive cryptographic algorithms In the chain network, how to process the block chain to solve the problem that the existing block chain network only supports a single cryptographic algorithm, and when there is a security hole in the cryptographic algorithm, it cannot be directly upgraded, and a hard fork is required. The whole set of block chain processing methods can be executed by cooperation between user nodes and block chain nodes, wherein the user nodes can be locally deployed devices with block chain clients used by users, such as user terminals. Optionally, the user node can be a node in the blockchain network, or not a node in the blockchain network, but can interact with the blockchain node through the interface provided by the bl...
Embodiment 2
[0066] figure 2 It is a flow chart of a block chain processing method provided by Embodiment 2 of the present invention. This embodiment is further optimized on the basis of the above embodiments, and provides a scenario where a security vulnerability occurs in the cryptographic algorithm of the target user. For the scheme of how to carry out blockchain processing, see figure 2 , the method may specifically include:
[0067] S210. Determine a target cryptographic algorithm used by the target user from at least two candidate cryptographic algorithms provided by the blockchain network, wherein the at least two candidate cryptographic algorithms are deployed in blockchain nodes.
[0068] S220. Create a blockchain account of the target user according to the target cryptographic algorithm, and add a marker of the target cryptographic algorithm to the blockchain account information as an algorithm marking part.
[0069] Among them, the algorithm marking part is used to determine...
Embodiment 3
[0085] image 3 It is a flow chart of a block chain processing method provided by Embodiment 3 of the present invention. This embodiment is based on the above embodiments, and further explained by creating a target user's block chain account according to the target cryptographic algorithm. see image 3 , the method may specifically include:
[0086] S310. Determine a target cryptographic algorithm used by the target user from at least two candidate cryptographic algorithms provided by the blockchain network, wherein the at least two candidate cryptographic algorithms are deployed in blockchain nodes.
[0087] S320, according to the obtained random number and the target elliptic curve in the target cryptographic algorithm, determine the value part of the block chain key of the target user.
[0088] In this embodiment, the value part in the blockchain key is the specific content of the blockchain key, which is used for signing / encrypting data, transaction requests, etc.; optio...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


